Results 1 to 10 of about 2,910 (182)

A novel dataset for encrypted virtual private network traffic analysis [PDF]

open access: yesData in Brief, 2023
Encryption of network traffic should guarantee anonymity and prevent potential interception of information. Encrypted virtual private networks (VPNs) are designed to create special data tunnels that allow reliable transmission between networks and/or end
Mohamed Naas, Jan Fesl
doaj   +2 more sources

Implementasi VPN Pada VPS Server Menggunakan OpenVPN dan Raspberry Pi

open access: yesTeknika, 2022
Komunikasi jaringan internet butuh keamanan, kemudahan, dan kecepatan transfer data yang baik. Hal ini harus diperhatikan oleh setiap pengguna dalam melakukan kegiatan di dunia maya atau internet, sehingga kerahasiaan informasi bisa terjaga dengan baik ...
Taufik Rahman   +3 more
doaj   +2 more sources

Security vs Bandwidth: Performance Analysis Between IPsec and OpenVPN in Smart Grid [PDF]

open access: yes2022 International Symposium on Networks, Computers and Communications (ISNCC), 2022
Secure wireless communication is an essential element of smart grid systems. This enables distributed industrial Internet of Things (IoT) assets to be remotely controlled and monitored from the control centre. In this piece of work, we evaluate the impact of employing OpenVPN and IPsec on the bandwidth required for the operation of distribution assets ...
Ghanem, Kinan   +5 more
exaly   +3 more sources

Analisa Konektivitas Jaringan IPSEC Dan OpenVPN Pada Jaringan Berbasis IP Dinamis

open access: yesInformatics, Electrical, and Electronics Engineering, 2021
Saat ini jaringan merupakan kebutuhan vital bagi setiap perusahaan. Dengan internet maka jaringan dapat terbentuk dan menghubungkan antar sektor atau divisi dalam perusahaan.
As' Ari Setya, Aris Sudaryanto
doaj   +3 more sources

Inferring OpenVPN State Machines Using Protocol State Fuzzing [PDF]

open access: yes2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2018
The reliability of a security protocol is of the utmost importance but can easily be compromised by a vulnerability in the implementation. A crucial aspect of an implementation is the protocol's state machine. The state machine of an implementation can be inferred by black box testing using regular inference.
Lesly-Ann Daniel, Joeri de Ruiter
exaly   +3 more sources

OpenVPN is Open to VPN Fingerprinting

open access: yesCommunications of the ACM
VPN adoption has seen steady growth over the past decade due to increased public awareness of privacy and surveillance threats. In response, certain governments are attempting to restrict VPN access by identifying connections using “dual use” DPI technology.
Xue, Diwen   +6 more
exaly   +3 more sources

Empirical Performance Analysis of WireGuard vs. OpenVPN in Cloud and Virtualised Environments Under Simulated Network Conditions

open access: yesComputers
With the rise in cloud computing and virtualisation, secure and efficient VPN solutions are essential for network connectivity. We present a systematic performance comparison of OpenVPN (v2.6.12) and WireGuard (v1.0.20210914) across Azure and VMware ...
Joel Anyam   +3 more
doaj   +3 more sources

Secure remote client connection to higher education institution internal computer network through VPN

open access: yesTaikomieji Moksliniai Tyrimai, 2023
The article analyzes the problem of secure connection of a remote client to the internal computer network of the higher education institution. The most commonly used OpenVPN, Libreswan and WireGuard solutions were evaluated.
Liudvikas Kaklauskas   +1 more
doaj   +1 more source

SafeSearch: Obfuscated VPN Server using Raspberry Pi for Secure Network

open access: yesJournal of Computing Research and Innovation, 2021
Virtual Private Network (VPN) is a private network that uses public network to tunnel the connection from the users’ end to the VPN server. VPN allows users to create a secure connection to another network over the public Internet.
Mohd Faris Mohd Fuzi   +3 more
doaj   +1 more source

Оцінка ефективності функціонування VPN при використанні терміналів супутникового зв’язку Starlink

open access: yesСистеми обробки інформації, 2023
В роботі проведено дослідження ефективності функціонування VPN при підключенні до мережі Інтернет з використанням терміналу супутникового зв’язку Starlink.
Д. С. Комін   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy